Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
Vulnerability Assessments and Risk Anal...
Students will learn the difference between qualitative and quantitative risk analysis. They will use a variety of methodologies (including MSHARPP & SME3R [asset owner's point of view], CARVER [aggressor's point of view], ABRA [combination] & CAIRA [analysis of energy systems supporting critical assets]) to evaluate single or multiple buildings and critical infrastructure nodes. This class is very “hands-on” with numerous f...
Security Criteria Development: Exceedin...
This course focuses on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet Federal, State and local government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also le...
Safe-haven and Shelter Design and Const...
Safe-haven and Shelter Design and Engineering (SAF) – A safe-room is a structure or protected area, that provides protection from man-made or natural threats, for both short and long periods of time. It usually serves as a fall-back position in case of emergencies. Effective design components; i.e., air requirements and waste management, capacity limits, use of electronic media and other technologies will be examined in detail. DOD requi...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
Using Building Design to Reduce the Eff...
Based on the assumption that preventive measures must be in place to be effective, students learn 25 mitigation strategies that when successfully applied reduce the impact of terrorist attack. We examine the current state of terrorism in the United States, its evolving nature and the future use of weapons of mass destruction. A variety of options are explored for addressing the most common manmade threats we face today and for the foreseeable...
IT Sustainability and Disaster Recovery
CANCELED
Disaster Recovery refers to the process, policies and procedures related to ensuring the resilience of technology infrastructure, including speedy and effective recovery / restoration of technology after a disaster or disruption. This workshop focuses on creating a sustainable IT environment within the corporate framework. Most organizations cannot survive a catastrophic failure of their IT system – learn how to protect yours. Myths and...
Vulnerability Assessments and Risk Anal...
CANCELED
(VAR) Vulnerability Assessments and Risk Analysis Methodologies – A variety of five qualitative and quantitative methodologies are discussed in detail. Students will learn the differences between qualitative and quantitative risk analysis. They will use a variety of methodologies by evaluating single or multiple buildings and critical infrastructure nodes. Three full days of field evaluations assessing lighting, electric systems, drinkin...
Drills and Exercise Planning and Development
(DEP) Drills & Exercise Planning and Development – Geared for those who must evaluate training plans, drills and other operational factors during extreme conditions. For three days, a series of table-top and field evaluations are designed by the students and tested. Students are exposed to armed forces style combat training type stress. Upon completion students will be able to design, development and conduct “live, virtual and...
Security Lighting: Influencing Positive...
(SLS) Crime Prevention: Security Lighting Systems Design - This workshop examines the relationships between theory, energy conservation, and social and environmental factors for man-made and natural light applications. Two full days focus on the effective use of lighting the environment to augment other forms of security technology. The effects of light on human physiological and psychological behavior are discussed in detail.
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.