$395 member/$495 nonmember
Vulnerability is not constant. It is variable and can be dependent, independent, or time dependent. The identification of vulnerability is critical to the larger security program. Effectively identifying, classifying, and implementing a vulnerability reduction program aren’t easy, especially in the potential absence of supportable security incident data, credible intelligence, or peer experience. Even with sound information to work with, what asset is more vulnerable than another and why is it so? The ability to understand and work effectively with the concepts of threat, risk, and impact will significantly assist in the determination of vulnerability and how it can be effectively reduced.
Sponsored by ASIS Physical Security Council
Program # 1509-MITIG
Pre-Seminar Programs and
register through the ASIS 2015 website.