Standard Operating Procedures (SOPs)
Review best practices in SOP preparation using specific examples within the asset protection domain.
Risk and Vulnerability Assessments
Learn about the elements of risk and vulnerability and the various types of assessment methodologies as well as where and when to apply them.
Program Management and Performance Measurement
Learn how to successfully manage programs and people through clear expectations, milestones, and measurements. Explore modern tools that help the security manager visualize data findings to identify key concerns and opportunities for improvement.
Security Force Management
Learn best practices for security force management, organizational structure, rules of conduct, and performance enhancing methods.
Explore the basic principles and practices of conducting successful investigations, including types of investigations, gathering and organizing relevant materials, and reporting the results.
Internal Controls and Fraud Prevention
Learn the motivation behind internal crime. Review proven methods and controls to reduce the opportunity and the impact of fraud.
Review contingency planning techniques for identifying foreseeable emergency risks, and establish procedures to mitigate risk, prevent incidents, and handle emergencies.
Ethics and Legal Issues
Security professionals must recognize ethical issues that are inconsistent with both their organization's mission and the law. Using actual "codes" as a guide, this session examines the importance of ethics in decision-making and organizational behavior.
Applying IT Security Principals and Best Practices in the Protection of Assets
Review the IT security risks and best practices for the physical security manager who is not an IT security professional but should understand network security requirements, identity management safeguards, and programs to safeguard company confidential and proprietary information. Identity management programs to safeguard the use of proprietary information. Security risks related to social media will also be discussed.
Intrusion Detection and Video Subsystems
Explore the advantages and disadvantages of intrusion detection technologies. Review the type, function, and purpose of intrusion sensors. Discuss natural as well as electronic methods of increasing surveillance of a property. Examine component video technologies; describe performance measures; and learn best practices for design and system integration.
Barriers/Delay Technologies and Concepts
Review barrier and locking options. Learn the benefits and implementation issues of various components in order to define an appropriate level of protection for specific threats and risks.
Entry/Access Control Concepts
Examine the purpose, theory, function, hardware, software, and layout of access control systems. Explore best practices and how to integrate components for optimal performance.
Negligent Security Liability
Part I: Review the legal foundation and key issues for negligent security lawsuits, including the concept of reasonable security. Part II: Examine employer liability for negligent hiring, supervision, and retention related to acts of violence by employees.
Principles of Investigative Interviewing
Learn how to determine if the subject is telling the truth, withholding information, or fabricating relevant information. Review how to incorporate behavior provoking questions and how to analyze verbal and non-verbal responses.
Data Collection and Analysis Methods
Knowing what data to collect and how to obtain and analyze it are essential to properly characterize assets and assess risk.
Workplace Violence (WPV)
Examine current trends in research on workplace aggression. Understand what it is, the associated legal issues, and how WPV affects your organization. Review program components and proactive best practices to manage WPV risk . This session builds on the previous "Premise Liability" module specifically related to legal issues resulting from incidents of violence in the workplace.