Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Anticipate the unexpected - ASIS 2012
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Education sessions: 3000 Series<br />
TUEsDAY, sEPTEMbEr 20 • 1:45 pm–3:00 pm<br />
3214 soft Targets<br />
● Fundamental<br />
Industry and government protection leaders share<br />
insight on <strong>the</strong> numerous challenges of securing<br />
soft targets in today’s changing environment.<br />
What makes a target soft, what makes it unique<br />
and challenging when evaluating risk assessments<br />
and/or in deploying security measures? The panel<br />
shares first-hand experiences, knowledge, and<br />
processes to shed light on <strong>the</strong> growing risk<br />
associated with soft targets. Whe<strong>the</strong>r you are a<br />
soft target, are responsible for employee travel<br />
and events, and/or charged with executive<br />
protection, you will gain a clearer understanding<br />
of this security phenomenon.<br />
James C. Reynolds, CPP, Director of Safety and Security,<br />
Hilton Worldwide<br />
Sponsored by <strong>the</strong> <strong>ASIS</strong> Global Terrorism, Political<br />
Instability, and International Crime Council<br />
3215 background Checks Under Fire:<br />
A Legal Update<br />
■ Intermediate<br />
Background screening practices are facing a<br />
firestorm of legal scrutiny, restrictions, and<br />
media criticism as evidenced by recent actions<br />
filed by <strong>the</strong> eeOc, laws targeting <strong>the</strong> use of credit<br />
and criminal data, and “ban <strong>the</strong> box” initiatives<br />
limiting <strong>the</strong> access to critical applicant information.<br />
Yet high profile shootings and widely<br />
publicized threats to workplace safety have left<br />
many wondering why more cannot be done to<br />
protect <strong>the</strong> workplace and <strong>the</strong> public. Security<br />
professionals are caught in <strong>the</strong> crosshairs. This<br />
session will arm you with a critical legal update<br />
and recommended best practices.<br />
Angela Bosworth, Executive Vice President, General<br />
Counsel, OPENonline<br />
3216 integrated Operational<br />
risk Management: A Look inside<br />
Westinghouse<br />
■ Intermediate<br />
understand <strong>the</strong> importance of an integrated<br />
operational risk program highlighting all assets:<br />
people, facilities, supply chain, and intellectual<br />
property. as global operational threats continue to<br />
increase, proactive programs are more important<br />
than ever. These threats can range from natural<br />
disasters to health to civil unrest to <strong>the</strong> cyber<br />
world. The first part of this session will outline <strong>the</strong><br />
key program considerations, while <strong>the</strong> second<br />
part will study a specific program employed by<br />
Westinghouse.<br />
Russell Cline, Corporate Security Director, Westinghouse<br />
Electric Company; Bruce McIndoe, President, iJET<br />
Intelligent Risk Systems<br />
3217 supply Chain security:<br />
The Americas<br />
■ Intermediate<br />
This session defines <strong>the</strong> scope and effect of<br />
cargo crime in <strong>the</strong> americas. understand <strong>the</strong><br />
need to have an effective cargo and supply chain<br />
security program for companies who move<br />
cargo in/out/through <strong>the</strong> amercias. Methods<br />
of protecting <strong>the</strong> supply chain and investigative<br />
best practices will be covered.<br />
Art Arway, CPP, Vice President/Regional Head of Security,<br />
Amercias, DHL Global Forwarding<br />
3218 Protection intelligence: Putting<br />
it in <strong>the</strong> Hands of Potential Targets<br />
● Fundamental<br />
Violence in Mexico often surpasses <strong>the</strong> abilities<br />
of authorities to immediately control dangerous<br />
situations. Mexicans have turned to each o<strong>the</strong>r to<br />
provide crucial and immediate information so as<br />
to avoid dangerous situations. learn <strong>the</strong> different<br />
methods utilized to disperse this information,<br />
how <strong>the</strong> populace has evolved in using social<br />
networks and communication mediums, and <strong>the</strong><br />
weaknesses of <strong>the</strong>se information mediums.<br />
actual case histories of violence and how citizens<br />
are utilizing <strong>the</strong>se information mediums will be<br />
discussed and analyzed. Methods to determine<br />
false or malicious information will be shown.<br />
Andrew Potts, Jr., Director, Cuspis S.A. de C. V.; Valdemar<br />
Valdez, Security Manager, Operadora Mega<br />
3219 Caution Advised: The Use<br />
of social Networking sites, search<br />
Engines, and Web 2.0 to screen<br />
Applicants<br />
■ Intermediate<br />
employers and security professionals have<br />
discovered a treasure trove of information on<br />
potential job applicants by using social networking<br />
sites, such as MySpace or Facebook, and search<br />
engines. however, just because something is<br />
available online does not mean <strong>the</strong>re is no legal<br />
risk involved or ensure <strong>the</strong> information is factual.<br />
This session examines <strong>the</strong> pros and cons of<br />
employers utilizing such tools. Through case<br />
studies and reviewing web sites, you will see<br />
visually how <strong>the</strong>se sites work, what <strong>the</strong>y contain,<br />
and <strong>the</strong> potential legal landmines and practical<br />
risks involved.<br />
Lester Rosen, Attorney at Law<br />
46 Asis 2011 <strong>Anticipate</strong> <strong>the</strong> <strong>unexpected</strong>. The security tools, techniques, and talent for tomorrow.