Security Criteria Development: Exceedin...
A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into the five functional areas of every good plan. They will also learn ho...
Sensitive Compartmented Information Fac...
After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent...
Physical Security Engineering Convergen...
With electronic technologies quickly converging in the physical security vertical it is paramount to understand; first, the basics of physical security, ssecondly, how this new technology will effect the physical security landscape of the future, and thirdly, how the correct physical security environment can actually enhance the technology's effectiveness. Every good physical security program starts with assessing and quantifying criticality,...
Identity, Credentials and Access Manage...
Identity, Credential and Access management (ICAM) – The Federal Identity, Credentialing and Access Management (ICAM) architecture provides Federal, State, Local, Tribal Agencies and the private industry with a consistent approach for managing the vetting and credentialing of individuals requiring access to information systems and facilities. On May 21, 2019 the Office of Management and Budget, (OMB) released M-19-17 Titled: Enabling Miss...
Designing Secure Buildings: Integrating...
(DSB) Designing Secure Buildings – This 3-day workshop is designed to familiarize students with twenty-one design principles used in preventing and detecting criminal activity and reducing the effects of acts of terrorism on the safety of personnel and damage to facilities and critical infrastructure. Specific modules include; Terrorism Ideologies, Security Basics, Philosophies and Design Strategies, Blast Fundamentals, Glazing and Windo...
Security Criteria Development: Exceedin...
(SCD) Security Criteria Development: Exceeding DHS Guidelines – A three-day workshop intensely focused on writing criteria for antiterrorism, continuity-of-operations (COOP) and resiliency, information security, physical security, operational security plans and operating procedures to meet government requirements. What should be included in each type of plan is discussed in detail. Students will learn how to translate company policy into...
Sensitive Compartmented Information Fac...
Sensitive Compartmented Information Facility Design and Construction – After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF), classified storage vaults and open storage spaces which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, ac...
The Five Pillars of Effective Physical...
Physical Security includes five components; detection, assessment, command and control (policy & procedures), response and engagement. Sadly, most of us in the security vertical focus on only one or two of these components and miss the others. These five elements must be intertwined and seamlessly integrated. If they all aren’t addressed, the “bad guy” wins. In this session we’ll outline what each component is, how...
IT Sustainability and Disaster Recovery
CANCELED
Disaster Recovery refers to the process, policies and procedures related to ensuring the resilience of technology infrastructure, including speedy and effective recovery / restoration of technology after a disaster or disruption. This workshop focuses on creating a sustainable IT environment within the corporate framework. Most organizations cannot survive a catastrophic failure of their IT system – learn how to protect yours. Myths and...
Sensitive Compartmented Information Fac...
After attending this unclassified Workshop, students will be able to oversee design and construction of a sensitive compartmented information facility (SCIF) which meets official government requirements for a secure area where classified information is handled. The stringent physical security requirements; such as, access control systems, thickness of doors, the strength of concrete and the use of alarms, and acoustical controls which prevent...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.