22.12.2012 Views

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

Anticipate the unexpected - ASIS 2012

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Education sessions: 3000 Series<br />

TUEsDAY, sEPTEMbEr 20 • 1:45 pm–3:00 pm<br />

3214 soft Targets<br />

● Fundamental<br />

Industry and government protection leaders share<br />

insight on <strong>the</strong> numerous challenges of securing<br />

soft targets in today’s changing environment.<br />

What makes a target soft, what makes it unique<br />

and challenging when evaluating risk assessments<br />

and/or in deploying security measures? The panel<br />

shares first-hand experiences, knowledge, and<br />

processes to shed light on <strong>the</strong> growing risk<br />

associated with soft targets. Whe<strong>the</strong>r you are a<br />

soft target, are responsible for employee travel<br />

and events, and/or charged with executive<br />

protection, you will gain a clearer understanding<br />

of this security phenomenon.<br />

James C. Reynolds, CPP, Director of Safety and Security,<br />

Hilton Worldwide<br />

Sponsored by <strong>the</strong> <strong>ASIS</strong> Global Terrorism, Political<br />

Instability, and International Crime Council<br />

3215 background Checks Under Fire:<br />

A Legal Update<br />

■ Intermediate<br />

Background screening practices are facing a<br />

firestorm of legal scrutiny, restrictions, and<br />

media criticism as evidenced by recent actions<br />

filed by <strong>the</strong> eeOc, laws targeting <strong>the</strong> use of credit<br />

and criminal data, and “ban <strong>the</strong> box” initiatives<br />

limiting <strong>the</strong> access to critical applicant information.<br />

Yet high profile shootings and widely<br />

publicized threats to workplace safety have left<br />

many wondering why more cannot be done to<br />

protect <strong>the</strong> workplace and <strong>the</strong> public. Security<br />

professionals are caught in <strong>the</strong> crosshairs. This<br />

session will arm you with a critical legal update<br />

and recommended best practices.<br />

Angela Bosworth, Executive Vice President, General<br />

Counsel, OPENonline<br />

3216 integrated Operational<br />

risk Management: A Look inside<br />

Westinghouse<br />

■ Intermediate<br />

understand <strong>the</strong> importance of an integrated<br />

operational risk program highlighting all assets:<br />

people, facilities, supply chain, and intellectual<br />

property. as global operational threats continue to<br />

increase, proactive programs are more important<br />

than ever. These threats can range from natural<br />

disasters to health to civil unrest to <strong>the</strong> cyber<br />

world. The first part of this session will outline <strong>the</strong><br />

key program considerations, while <strong>the</strong> second<br />

part will study a specific program employed by<br />

Westinghouse.<br />

Russell Cline, Corporate Security Director, Westinghouse<br />

Electric Company; Bruce McIndoe, President, iJET<br />

Intelligent Risk Systems<br />

3217 supply Chain security:<br />

The Americas<br />

■ Intermediate<br />

This session defines <strong>the</strong> scope and effect of<br />

cargo crime in <strong>the</strong> americas. understand <strong>the</strong><br />

need to have an effective cargo and supply chain<br />

security program for companies who move<br />

cargo in/out/through <strong>the</strong> amercias. Methods<br />

of protecting <strong>the</strong> supply chain and investigative<br />

best practices will be covered.<br />

Art Arway, CPP, Vice President/Regional Head of Security,<br />

Amercias, DHL Global Forwarding<br />

3218 Protection intelligence: Putting<br />

it in <strong>the</strong> Hands of Potential Targets<br />

● Fundamental<br />

Violence in Mexico often surpasses <strong>the</strong> abilities<br />

of authorities to immediately control dangerous<br />

situations. Mexicans have turned to each o<strong>the</strong>r to<br />

provide crucial and immediate information so as<br />

to avoid dangerous situations. learn <strong>the</strong> different<br />

methods utilized to disperse this information,<br />

how <strong>the</strong> populace has evolved in using social<br />

networks and communication mediums, and <strong>the</strong><br />

weaknesses of <strong>the</strong>se information mediums.<br />

actual case histories of violence and how citizens<br />

are utilizing <strong>the</strong>se information mediums will be<br />

discussed and analyzed. Methods to determine<br />

false or malicious information will be shown.<br />

Andrew Potts, Jr., Director, Cuspis S.A. de C. V.; Valdemar<br />

Valdez, Security Manager, Operadora Mega<br />

3219 Caution Advised: The Use<br />

of social Networking sites, search<br />

Engines, and Web 2.0 to screen<br />

Applicants<br />

■ Intermediate<br />

employers and security professionals have<br />

discovered a treasure trove of information on<br />

potential job applicants by using social networking<br />

sites, such as MySpace or Facebook, and search<br />

engines. however, just because something is<br />

available online does not mean <strong>the</strong>re is no legal<br />

risk involved or ensure <strong>the</strong> information is factual.<br />

This session examines <strong>the</strong> pros and cons of<br />

employers utilizing such tools. Through case<br />

studies and reviewing web sites, you will see<br />

visually how <strong>the</strong>se sites work, what <strong>the</strong>y contain,<br />

and <strong>the</strong> potential legal landmines and practical<br />

risks involved.<br />

Lester Rosen, Attorney at Law<br />

46 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!