Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Interagency Security Committeee: Risk A...
The Interagency Security Committee (ISC) developed the ISC Risk Management Process to ensure that security becomes an integral part of the planning, design, and construction of new federal office buildings and major modernization projects. The criteria considers security in all building systems and elements. In this 3-day workshop we cover the risk management process for federal facilities and security industry best practices in protecting pro...
Identity, Credentials and Access Manage...
Identity, Credential and Access management (ICAM) – The Federal Identity, Credentialing and Access Management (ICAM) architecture provides Federal, State, Local, Tribal Agencies and the private industry with a consistent approach for managing the vetting and credentialing of individuals requiring access to information systems and facilities. On May 21, 2019 the Office of Management and Budget, (OMB) released M-19-17 Titled: Enabling Miss...
Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
Sensitive Compartmented Information Fac...
After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent...
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
UFC-Minimum Antiterrorism Standards for...
This course is available to all Federal, State, local government and private sector SECURITY and ENGINEERING professionals. While the course focuses on securing DOD assets, the concepts learned are prudent and applicable in reducing criminal and terrorist threats to non-DOD buildings, as well. Contractors and consultants seeking construction contracts with the Department of Defense will attend this course. The course is designed to familiarize...
Vulnerability Assessment/Risk Analysis...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & R3SME [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This workshop is very “hands-on” with numerou...
Safe-haven Design and Construction
A safe-haven is a structure or protected area, that provides protection from man-made or natural threats, for both short and long periods of time. It usually serves as a fall back position in case of emergencies. Effective design components; i.e., air requirements and waste management, capacity limits, use of electronic media and other technologies will be examined in detail.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.