22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Education sessions: 2000 Series<br />

MONDAY, sEPTEMbEr 19 • 4:30 pm–5:30 pm<br />

2308 To Arm or Not to Arm?<br />

■ Intermediate<br />

decades of decline in <strong>the</strong> number of armed<br />

security officers were reversed following 9/11.<br />

While <strong>the</strong> decision to arm or recommend <strong>the</strong><br />

arming of officers is both controversial and<br />

emotional, it must be based both on solid data,<br />

quantifiable objectives, and a commitment to<br />

<strong>the</strong> safety of all concerned. This presentation,<br />

a case study of <strong>the</strong> actual decision-making<br />

process that resulted in <strong>the</strong> arming of a hospital<br />

security department, covers all aspects, from<br />

data-ga<strong>the</strong>ring to program implementation.<br />

Anthony N. Potter, CPP, CHPA-F, Senior Director of Public<br />

Safety, Novant Health<br />

2309 information and Data security<br />

While Away From <strong>the</strong> Office<br />

● Fundamental<br />

domestically and internationally, travelers need<br />

to be aware of <strong>the</strong> dangers that surround <strong>the</strong>m<br />

while on personal or business trips. Technology<br />

used by criminals like WiFi snooping, “evil twins,”<br />

bluetooth surveillance, cloud hacking, GPS<br />

tracking, and o<strong>the</strong>rs have been <strong>the</strong> downfall of<br />

many businesses and <strong>the</strong>ir competitive intelligence.<br />

This popular session cites case studies,<br />

shows examples of tools used by thieves, and<br />

give tips and pointers to lower <strong>the</strong> risk to travelers<br />

and <strong>the</strong>ir data.<br />

J. Keith Flannigan, Ph.D., CMAS, Director, International<br />

Dynamics Research Corp.; Ronald Lander, CPP, CMAS,<br />

Chief Specialist, Ultrasafe Security Solutions; Roy<br />

Wilkinson, Ph.D., CMAS, CISSP, President, SPI Services<br />

2310 Understanding <strong>the</strong> shifting of<br />

risk: A Moving Target<br />

■ Intermediate<br />

Protecting a fixed facility is just one step. What<br />

about <strong>the</strong> product in transport from a facility<br />

perspective? This session looks at handling<br />

steps including multi-distribution warehousing,<br />

diversion, long route concerns, contaminated<br />

trailers, drivers, overnight unsecured yards,<br />

contractor or temporary services operating <strong>the</strong><br />

warehouse, delivery confirmation, and customer<br />

verification measures. It explores <strong>the</strong> steps<br />

being taken along <strong>the</strong> food supply chain to<br />

protect our food. It also highlights potential<br />

changes stemming from <strong>the</strong> current regulatory<br />

environment.<br />

Dan Walters, CPP, Manager of Security & Environmental<br />

Risk, CF Industries; Judy Fadden<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Agriculture and Food Security<br />

Council<br />

2311 building on <strong>the</strong> Foundation:<br />

More on Arabs and islam<br />

● Fundamental<br />

This session starts with a pop quiz (this same<br />

quiz and session have been used in FBI, dOJ, and<br />

dhS trainings.) Then join in an interactive dialogue<br />

to address <strong>the</strong> misconceptions and perceptions<br />

about <strong>the</strong> Muslim and arab communities. Social<br />

and behavioral norms and mores, basic history<br />

and geography, Jihad, and o<strong>the</strong>r subjects that<br />

interest <strong>the</strong> audience will be addressed.<br />

Nawar Shora, CEO, Shams Training & Development<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Cultural Properties Council<br />

2312 New security standard in China<br />

and Your business<br />

● Fundamental<br />

as china becomes a new economic powerhouse,<br />

more investors are becoming interested in it.<br />

Yet because of cultural differences between<br />

<strong>the</strong> east and West, a simple investment could<br />

become a complicated disaster. It is vital for<br />

investors to understand <strong>the</strong> importance of<br />

protecting <strong>the</strong>ir investments. Private security<br />

is one solution. Gain insight as <strong>the</strong> speakers<br />

share over 30 years of practical experiences<br />

on why, when, what, where, and how.<br />

Jack Chu, President, RA Consultants Limited; Hawn Chu,<br />

Consultant, RA Consultants Limited<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Investigations Council<br />

2313 Advanced internet/social<br />

Network investigations and<br />

background Checks<br />

▲ Advanced<br />

Open sources go far beyond what is available in<br />

Google and Facebook, as well as o<strong>the</strong>r popular<br />

sites. This session looks beyond <strong>the</strong> obvious<br />

services into social networks and similar media<br />

to locate assets, discover company leaks, protect<br />

reputations, track down anonymous users, and<br />

expand <strong>the</strong> arsenal of resources available but<br />

unknown to <strong>the</strong> security professional. In addition,<br />

we’ll discuss <strong>the</strong> obvious pitfalls that most<br />

practitioners fall into when investigating <strong>the</strong>se<br />

new media.<br />

Cynthia He<strong>the</strong>rington, President, He<strong>the</strong>rington Group<br />

32 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!