Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Education sessions: 2000 Series<br />
MONDAY, sEPTEMbEr 19 • 4:30 pm–5:30 pm<br />
2308 To Arm or Not to Arm?<br />
■ Intermediate<br />
decades of decline in <strong>the</strong> number of armed<br />
security officers were reversed following 9/11.<br />
While <strong>the</strong> decision to arm or recommend <strong>the</strong><br />
arming of officers is both controversial and<br />
emotional, it must be based both on solid data,<br />
quantifiable objectives, and a commitment to<br />
<strong>the</strong> safety of all concerned. This presentation,<br />
a case study of <strong>the</strong> actual decision-making<br />
process that resulted in <strong>the</strong> arming of a hospital<br />
security department, covers all aspects, from<br />
data-ga<strong>the</strong>ring to program implementation.<br />
Anthony N. Potter, CPP, CHPA-F, Senior Director of Public<br />
Safety, Novant Health<br />
2309 information and Data security<br />
While Away From <strong>the</strong> Office<br />
● Fundamental<br />
domestically and internationally, travelers need<br />
to be aware of <strong>the</strong> dangers that surround <strong>the</strong>m<br />
while on personal or business trips. Technology<br />
used by criminals like WiFi snooping, “evil twins,”<br />
bluetooth surveillance, cloud hacking, GPS<br />
tracking, and o<strong>the</strong>rs have been <strong>the</strong> downfall of<br />
many businesses and <strong>the</strong>ir competitive intelligence.<br />
This popular session cites case studies,<br />
shows examples of tools used by thieves, and<br />
give tips and pointers to lower <strong>the</strong> risk to travelers<br />
and <strong>the</strong>ir data.<br />
J. Keith Flannigan, Ph.D., CMAS, Director, International<br />
Dynamics Research Corp.; Ronald Lander, CPP, CMAS,<br />
Chief Specialist, Ultrasafe Security Solutions; Roy<br />
Wilkinson, Ph.D., CMAS, CISSP, President, SPI Services<br />
2310 Understanding <strong>the</strong> shifting of<br />
risk: A Moving Target<br />
■ Intermediate<br />
Protecting a fixed facility is just one step. What<br />
about <strong>the</strong> product in transport from a facility<br />
perspective? This session looks at handling<br />
steps including multi-distribution warehousing,<br />
diversion, long route concerns, contaminated<br />
trailers, drivers, overnight unsecured yards,<br />
contractor or temporary services operating <strong>the</strong><br />
warehouse, delivery confirmation, and customer<br />
verification measures. It explores <strong>the</strong> steps<br />
being taken along <strong>the</strong> food supply chain to<br />
protect our food. It also highlights potential<br />
changes stemming from <strong>the</strong> current regulatory<br />
environment.<br />
Dan Walters, CPP, Manager of Security & Environmental<br />
Risk, CF Industries; Judy Fadden<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Agriculture and Food Security<br />
Council<br />
2311 building on <strong>the</strong> Foundation:<br />
More on Arabs and islam<br />
● Fundamental<br />
This session starts with a pop quiz (this same<br />
quiz and session have been used in FBI, dOJ, and<br />
dhS trainings.) Then join in an interactive dialogue<br />
to address <strong>the</strong> misconceptions and perceptions<br />
about <strong>the</strong> Muslim and arab communities. Social<br />
and behavioral norms and mores, basic history<br />
and geography, Jihad, and o<strong>the</strong>r subjects that<br />
interest <strong>the</strong> audience will be addressed.<br />
Nawar Shora, CEO, Shams Training & Development<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Cultural Properties Council<br />
2312 New security standard in China<br />
and Your business<br />
● Fundamental<br />
as china becomes a new economic powerhouse,<br />
more investors are becoming interested in it.<br />
Yet because of cultural differences between<br />
<strong>the</strong> east and West, a simple investment could<br />
become a complicated disaster. It is vital for<br />
investors to understand <strong>the</strong> importance of<br />
protecting <strong>the</strong>ir investments. Private security<br />
is one solution. Gain insight as <strong>the</strong> speakers<br />
share over 30 years of practical experiences<br />
on why, when, what, where, and how.<br />
Jack Chu, President, RA Consultants Limited; Hawn Chu,<br />
Consultant, RA Consultants Limited<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Investigations Council<br />
2313 Advanced internet/social<br />
Network investigations and<br />
background Checks<br />
▲ Advanced<br />
Open sources go far beyond what is available in<br />
Google and Facebook, as well as o<strong>the</strong>r popular<br />
sites. This session looks beyond <strong>the</strong> obvious<br />
services into social networks and similar media<br />
to locate assets, discover company leaks, protect<br />
reputations, track down anonymous users, and<br />
expand <strong>the</strong> arsenal of resources available but<br />
unknown to <strong>the</strong> security professional. In addition,<br />
we’ll discuss <strong>the</strong> obvious pitfalls that most<br />
practitioners fall into when investigating <strong>the</strong>se<br />
new media.<br />
Cynthia He<strong>the</strong>rington, President, He<strong>the</strong>rington Group<br />
32 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.