ASIS PHYSICAL SECURITY COUNCIL & ASIS FOUNDATION “ROY BORDES AWARD” and ASIS 239 Mexico North Present, “MANAGING YOUR PHYSICAL SECURITY PROGRAM”

Slides:



Advertisements
Similar presentations
CEFPI is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this.
Advertisements

The State of the Chapters Chapter Executive Directors Conference March 11, 2010.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
TALOS Total ATM Life-cycle operational Solution. The Cost equation Life cycle costs are high Life cycle costs are complex Life cycle costs involve all.
KPMG’s Abilities in Motion Network USBLN Annual Conference October 2012 kpmg.com.
Managing the Information Technology Resource Jerry N. Luftman
1 IS112 – Chapter 1 Notes Computer Organization and Programming Professor Catherine Dwyer Fall 2005.
Pertemuan Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Anatomy of Total Hospital Security Presented by: H. Edward Creamer Security Assessments International, Inc. June 16, 2005.
A Connected World in transformation NICE – DATACENTRES 2012 May 23 rd 2012 Paul-François CATTIER Global Data Centre Solution VP.
HRPA INFORMATION SESSION. Presentation Agenda Who is HRPA? What is the Certified Human Resources Professional (CHRP) designation? Why join HRPA? How to.
Privileged and Confidential Strategic Approach to Asset Management Presented to October Urban Water Council Regional Seminar.
1 Review of NASBA Standards and Requirements Presented by Amy Greenhoe October 28, :30 Eastern Time.
Webinar Title Presenter Name Presenter Title Presenter Organization
REVISED JUDGING CRITERION – AN INTRODUCTION. What is the revised judging criterion? Which Enactus team most effectively used entrepreneurial action to.
23RD MEETING OF THE VOORBURG GROUP SEPTEMBER 22-26, 2008 AGUASCALIENTES, MÉXICO 23RD MEETING OF THE VOORBURG GROUP SEPTEMBER 22-26, 2008 AGUASCALIENTES,
© 2007 ISACA ® All Rights Reserved DAMA-NCR Chapter Meeting March 11, 2008.
Technician Module 2 Unit 8 Slide 1 MODULE 2 UNIT 8 Prevention, Intelligence & Deterrence.
Sustainability and Total Cost of Ownership Strategies for Higher Education.
2014 E DUCATIONAL T ECHNOLOGY P LAN P ROJECT K ICKOFF.
Engaging Contractors in the Environmental Management System (EMS) Department of Energy EMS Workshop: Implementation, Lessons Learned, and Best Practices.
Module 3 Develop the Plan Planning for Emergencies – For Small Business –
Information Systems Security Computer System Life Cycle Security.
This is the best Power Point Template ever. It comes with over 5 styles of colors and include lots of features. Serving New England Businesses Since 1988.
Research Policy Practice September 2013 Leadership Call.
Essential Enterprise IT Governance with COBIT®5 Date: 7 th and 8 th October 2015 Time: 9 am to 5.30 pm Venue: Iverson Associates, Center Point Bandar Utama,
June 20, 2012 Outsourcing Physical Plant Should I ???
NEED EQUIPMENT SERVICE?. What is CFESA? The Commercial Food Equipment Service Association is the trade organization of professional service.
Epiphany Partners Corporation HealthTechNet ClerePath TM Solution July 21, 2006.
Introduction to Security
SCSC 311 Information Systems: hardware and software.
Best Practices: Financial Resource Management February 2011.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
ITIL Operational Support and Analysis -OSA- Full Certification Online Learning and Study Book Course - The ITIL Intermediate OSA Capability Complete Certification.
Emergency Management Training and Education System Protection and National Preparedness National Preparedness Directorate National Training and Education.
E-Procurement Vendor Session Lake Michigan Room Michigan Economic Development Center October 27 th, 2005.
ITIL Release- Control and Validation -RCV- Full Certification Online Learning and Study Book Course - The ITIL Intermediate RCV Capability Complete Certification.
New A.M. Best Cyber Questionnaire
ITIL Intermediate Lifecycle program- Service Transition ST 1 Why bother paying extra money for all the bells and whistles that you're never going to use.
Chapter 8 Auditing in an E-commerce Environment
THE WHAT, WHY AND HOW OF OUTSOURCING INFORMATION SYSTEMS.
Welcome to Unit 5 Seminar If you can see this screen, share with your classmates the following……The best meal I ever ate was…… Audio will start promptly.
Business Continuity Disaster Planning
STRATEGY IMPLEMENTATION Chapter 7. FUNCTIONAL STRATEGIES These are made up of day to day decisions made at the operating level of the firm, often performed.
ISIS Project Status Report May 18, 2006 Prepared by MAXIMUS, Inc Education Systems Division for the ABT Committee.
What is the Prevent Duty? Part of the 2015 Counter Terrorism and Security Act. A duty to protect ‘people from being drawn into terrorism’ by “extremists.”
ITIL Service Offerings and Agreements -SOA- Full Certification Online Learning and Study Book Course - The ITIL Intermediate SOA Capability Complete Certification.
Business Continuity Planning For ACS Clients. NSAA Proposed Model Rule  Assist Advisers in responsibility to maintain business continuity  Protect clients.
Thank you for your interest in establishing a new Scarlet & Gold Event Committee in your region to raise funds to support the Marine Corps Scholarship.
CHALLENGES, TRENDS AND EVALUATION OF MERGING PROCESSES CIAT TECHNICAL CONFERENCE Paris October 2010 By: Victor van Kommer Director Knowledge Centre.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Pre-Event Planning Unit 2. Visual 2.1 Unit 2 Overview This unit describes:  When communities should begin planning for a special event.  The concept.
Chapter 1 Computer Technology: Your Need to Know
New A.M. Best Cyber Questionnaire
Requirements & Process Review Report
Purpose Driven Essentials Overview How to Grow a Healthy Church
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Integrated Management System and Certification
Strategy implementation
Safety and Security- From Assessment to Implementation
INFORMATION SYSTEMS SECURITY and CONTROL
EC Strategy, Globalization, and SMEs
LO2 - Be Able to Design IT Systems to Meet Business Needs
Stretch Your Budget With Organizational Membership
Managed Content Services
ASIS’ Flagship Event in Europe
Grady High School Good Morning/Afternoon! Today we begin the process of planning our school’s budget for FY20. I know we are all here for the same reason.
Presentation transcript:

ASIS PHYSICAL SECURITY COUNCIL & ASIS FOUNDATION “ROY BORDES AWARD” and ASIS 239 Mexico North Present, “MANAGING YOUR PHYSICAL SECURITY PROGRAM”

Review your risk strategies and ability to address risk issues which are critical to your corporation or organization. Review your ability to manage effective access to secure facilities. Review best practices and whether they apply in your environment. Expand your responsibilities to meet the new challenges in today’s converged programs. Improve the effectiveness of your security program. Increase your working knowledge of the latest equipment, systems, and application technologies. Review the issues surrounding legal liability. Increase your effectiveness at key project stages: plan, specify, purchase, implement, and manage. Cualifies for recertification credits to members with CPP, PSI and PSP status Cualifies for recertification credits to members with CPP, PSI and PSP status Security directors, managers, and officers Facility managers Information security professionals Risk management personnel Government operations Design professionals Members with ASIS Certifications

PROGRAM OVERVIEW Counter Terrorism Planning – Antiterrorism planning is a core requirement for many security managers in today’s environment. How you organize your resources and execute your plan can make all the difference in whether you make it on to a terrorist’s target list or are dropped as presenting too hard a target. In this presentation you will learn how to create and execute an antiterrorism plan, how to work with counterterrorist forces, and how to do it all without breaking your security budget. Characterizing, Quantifying and Managing Risk – What does management expect you to do about it? Do you know your corporation’s appetite for risk and how your security program is expected to support it? Can you predict risk and the changes that are likely to occur given both internal and external pressures? Managing Site-Wide Access – Managing access (and egress) from a secure facility require many elements to work in concert with one another. Discuss current best practices, technologies and protocols which facilitate securing a perimeter and the flow of people and assets which pass through it.. (Crime Prevention Through Environmental Design) CPTED (Crime Prevention Through Environmental Design) – Learn how implementing and managing the CPTED process can contribute to the success of your physical security program. Very useful to gain and promote physical ground characteristics and help thru this your security personnel.

Program Planning and Security Life Cycle – Integrating Risk Tolerance, Return-on-Investment and Total Cost of Ownership in the Strategic Security Planning Process Cloud Computing – Outsourcing the Physical Security Technology process is an option which is becoming more available to an increasing number security functions. What opportunities and potential security issues are involved in this outsourcing process? Design and Management of CCV and Network Video Systems (Digital Video Management) - Review camera technologies that can positively impact your security program Managing a Maintenance Program - System Maintenance Agreements – Managing preventative maintenance warranty, service, troubleshooting, configuration management (drawings, software, hardware, training), and response throughout the system / program lifecycle; value and risks associated with software support and upgrades Legal/Liability Issues – How do operations, maintenance, training, staffing, systems (and lack thereof) impact liability? Understanding the Security Process – The “security process” is comprised of a diverse range of individual security components which include human, technology and integrated process inputs. These inputs and how we integrate the foundations of security such as threat, risk and impact with them will be discussed. PROGRAM OVERVIEW

WELCOME RECEPTION: will be held at Hotel Holiday Inn Fundidora 19:00 hrs., exclusive for ASIS Members attending to this seminar. CLASSROOM: OCEANIA, INSIDE CINTERMEX FACILITIES CLASSES WILL BE GIVEN IN ENGLISH. SIMULTANEOUS TRANSLATION WILL BE AVAILABLE Registration Hours: October 3 rd., 7:30–8:00 am From 8:00 am to 17:00 hrs. Program Hours: From 8:00 am to 17:00 hrs. REGISTRATION FEES:Members paid ASIS 239 Mexico North:$ USD * Members Chapter 239 & other chapters: $ USD * NO members:$ USD * NO members:$ USD * * Fees does not includes Taxes or Hotel reservations. * Fees does not includes Taxes or Hotel reservations. HOTEL Information: Hotel Holiday Inn Fundidora Special rate for the seminar (Click here) Special rate for the seminar (Click here)(Click here)(Click here) Please be sure to be registered as a program attendee. Please be sure to be registered as a program attendee. Continuing Professional Education (CPE): ASIS-sponsored programs are worth CPE’s depending on the length of the program. Certificates of completion: ASIS reserves the right to withhold certificates if attendance requirements are not met. Attire: Business casual is recommended. Free participation in the Expo Mundo de la seguridad Conferences given by ASIS members from our country from our country Registration and deposits: Beneficiary: AC México Norte, A.C. Bank: Bancomer Account: Branch: 0223 CLABE: Contact: