Transform Security Theories into Action
The presenters were outstanding. The experience level and communication skill of each resulted in a great learning experience.
Senior Manager Physical Security Operations
Harland Clarke Holding Corporation
Your grasp of the fundamental concepts of asset protection is solid. Are you confident that you can now flawlessly execute this knowledge when confronted with ever-increasing challenges?
In this course, nationally esteemed instructors guide you through real-life case studies and provide proven solutions, best practices, and field-tested strategies. Gain conceptual insights from various points-of-view on current trends and developing methodologies for successfully mitigating risks. The program addresses seven key aeras of concern every security expert must be well versed on to be successful.
- Learn strategies that create value within the business section
- Understand the various disciplines and how they integrate into security activities
- Discuss challenges facing security professionals and best practices
- Develop practical fact-finding skills for effectively communicating within an organization
Who Should to Attend
- Security executives and managers
- Individuals with direct or indirect responsibility for security—particularly human resources, facilities, and legal personnel
- Supervisors of security personnel and proprietary operations
- Professionals moving into security management positions regardless of experience
- Individuals transitioning from the public to the private sector
- Managers who oversee the discharge of security services and personnel
Employment and Liability Law
Keep the law on your side and get answers to questions that matter. Focus on expanding your knowledge of employment law minefields—including EEO, ADA, ADEA, FMLA, and security-related liability that can affect you personally and your company—as well as issues of negligent hiring, retention, and training. Get updates on employment law decisions affecting all employees, with emphasis on cases involving security professionals.
Workplace Violence Risk/Threat Assessment and Management
Explore the practical aspects of potential workplace violence case management: objectives, key decisions, and issues which arise when managing cases. The training will be segmented into specialized information modules of behavioral assessment, information gathering, and operational processes including initial reporting, law enforcement liaison, communications with stakeholders, intervention, and ongoing case monitoring. You will be given a brief Introduction to an effective immediate crisis reaction methodology of workplace violence and active assailant: Run, Hide, Fight.
Investigations in the Workplace
Proper and ethical investigations are complex undertakings that are time consuming and fraught with enormous potential for legal liability. Few activities invoke so much risk and at the same time yield so much opportunity. Examine the intricacies of conducting proper and effective workplace investigations and review how to traverse the legal minefields and traps inherent in the process. Learn how to use the Process of Investigation® in order to yield the best results and obtain the highest ROI of time and resources.
Leadership vs. Management
This interactive session will explore various leadership models and help participants identify their preferred style. Key competencies of a 21st Century leader and mechanisms for showing those competencies as a leader will be addressed. You will have an opportunity to explore concepts around emotional and social intelligence and how it impacts team and leadership dynamics.
Do you have the knowledge to protect your company's computer system and information from theft and damage to its hardware and software? This session will give you a basic understanding of hte threats and malicious programs that can disrupt services to your customers and employees.
Terrorism and Insider Threats
Receive information from a representative of the National Counter Terrorism Center (NCTC) regarding the current state of terrorism worldwide and the threats to the private and public sectors in the U.S. Additionally, learn the warning signs of a potential insider threat from both internal and external sources.
Risk and Vulnerability Assessments
Conducting a risk and vulnerability assessment today encompasses a broad spectrum of concerns and issues. In today's electronic age, coordination with a system's integrator is key to a successful and functioning security program of CCTV, access control, alarms, etc. Both the assessor and integrator must have an udnerstanding of the broad concepts of enterprise risk maangement.